There are three steps to configure a GSuite connection:
NOTE
- It is not possible to generate Client Credentials using federated logins.
- Each environment allows only one active Federated Login provider at a time. If there is already a provider with Active status, it will not be possible to activate or create another provider. To configure a new provider, first deactivate the active provider. Once the status has changed, the creation or activation of another provider will be allowed.
WARNINGWhen you delete a federated login provider:
- Users originally created as local users in Access Control regain access via login and password, after a password reset.
- Users created exclusively through federated login, who were never local users, are permanently deleted, automatically and without prior notice. This data cannot be recovered after deletion.
To configure a GSuite connection, follow the steps below:
Access the Federated Login screen from the left menu.
Select the GSuite federated login type and click CONFIGURE FEDERATED LOGIN.
Copy the URL from the Callback URL field.

IMPORTANTThis is the URL to which the user should be returned after authentication and will be used later in the Google Cloud Console configuration.
In a new tab, access the Google Cloud Console.
Create a new project by clicking CREATE PROJECT in the upper left corner of the screen.

Enter the project name and location. Then click CREATE.

Wait for your project to be created.
A message will be displayed in the notifications icon
.
Click the notifications icon and select the newly created project. You can also use the search bar to locate and select it.

After selecting the project, in the left sidebar select APIs & Services > Credentials.

On the Credentials screen, click Configure consent screen.

On the OAuth Overview screen, click Get started.

Fill in the fields in the App information section and click Next.

In the Audience section, select External and click Next.
IMPORTANTThe External option enables application creation in Google Cloud Console.
However, when using this option, any user with a Google Account may try to access the environment, which can increase exposure.
To reduce this risk, make sure to configure test users and any other restrictions correctly during the process.
If your organization requires stricter access control, consider using the Internal option, which limits access to users from the configured domain only.

In Contact Information, provide one or more email addresses and click Next. The email addresses provided will be used by Google for notifications about changes made to the project.

Review Google's data use policy and, if you agree, select the checkbox and click Continue, then Create.
On the OAuth Overview screen, click Create OAuth client.

In Create OAuth client ID:

In the Authorized redirect URIs section, click ADD URI and enter the address (callback URL) that you copied in step 3 of the integration creation stage in Access Control.

Click CREATE. Your OAuth client will be created and the Client ID and Client secret will be displayed. Click OK.
IMPORTANTSave this data, as it will be used in the Access Control configuration.

In the left sidebar, go to Audience and, in the Test users section, click ADD USERS.

Enter a valid email managed by Google and click Save.
IMPORTANTThis user will be used to access Access Control.

After creating the app in Google Cloud Console, return to Access Control and fill in the fields below with the obtained data:
NOTEIf there are roles configured on your identity provider side, they will prevail over this one.
While active, the connection with GSuite can be updated at any time. To do this, click any field you wish to edit, make the necessary modifications and click Save Changes to confirm and update or Back to cancel.
To disable a connection, click the Delete Login button.
WARNING
- When you click Delete Login, the federated login provider is deleted. Users originally created as local users in Access Control regain access via login and password after a password reset; users created exclusively through federated login are permanently deleted. See the details at the top of this page.
- To re-establish the connection, follow the steps above again (Configuring a GSuite connection).
- Clicking Delete Login does not change your settings with your identity provider.
Unlike what happened with login through the Sensedia Platform, now login with username and password continues to be possible even after configuring GSuite.
A user will be able to log into Sensedia products both through GSuite and separately.
We use cookies to enhance your experience on our site. By continuing to browse, you agree to our use of cookies.Learn more